950 resultados para compliant cryptologic protocols
Resumo:
AbstractObjective:To assess the reduction of estimated radiation dose in abdominal computed tomography following the implementation of new scan protocols on the basis of clinical suspicion and of adjusted images acquisition parameters.Materials and Methods:Retrospective and prospective review of reports on radiation dose from abdominal CT scans performed three months before (group A – 551 studies) and three months after (group B – 788 studies) implementation of new scan protocols proposed as a function of clinical indications. Also, the images acquisition parameters were adjusted to reduce the radiation dose at each scan phase. The groups were compared for mean number of acquisition phases, mean CTDIvol per phase, mean DLP per phase, and mean DLP per scan.Results:A significant reduction was observed for group B as regards all the analyzed aspects, as follows: 33.9%, 25.0%, 27.0% and 52.5%, respectively for number of acquisition phases, CTDIvol per phase, DLP per phase and DLP per scan (p < 0.001).Conclusion:The rational use of abdominal computed tomography scan phases based on the clinical suspicion in conjunction with the adjusted images acquisition parameters allows for a 50% reduction in the radiation dose from abdominal computed tomography scans.
Resumo:
Peer-reviewed
Resumo:
Paratuberculosis is an important enteritis of ruminants caused by Mycobacterium avium subsp. paratuberculosis (Map). The disease is officially considered exotic in Brazil, but recent serological surveys and the isolation of the agent suggest it may occur in our herds. The aim of this study was to evaluate three different formulations of Herrold's egg yolk agar with mycobactin J (HEYM) and four faecal culture protocols considering their ability for Map growth as well as cost and ease of application. Three formulations of HEYM were inoculated with two suspensions of Map. Spiked faeces and naturally contaminated faecal samples were treated by the four faecal culture protocols. Centrifugation protocol and HEYM recommended by OIE showed the best results on the recovery of Map.
Resumo:
A web service is a software system that provides a machine-processable interface to the other machines over the network using different Internet protocols. They are being increasingly used in the industry in order to automate different tasks and offer services to a wider audience. The REST architectural style aims at producing scalable and extensible web services using technologies that play well with the existing tools and infrastructure of the web. It provides a uniform set of operation that can be used to invoke a CRUD interface (create, retrieve, update and delete) of a web service. The stateless behavior of the service interface requires that every request to a resource is independent of the previous ones facilitating scalability. Automated systems, e.g., hotel reservation systems, provide advanced scenarios for stateful services that require a certain sequence of requests that must be followed in order to fulfill the service goals. Designing and developing such services for advanced scenarios with REST constraints require rigorous approaches that are capable of creating web services that can be trusted for their behavior. Systems that can be trusted for their behavior can be termed as dependable systems. This thesis presents an integrated design, analysis and validation approach that facilitates the service developer to create dependable and stateful REST web services. The main contribution of this thesis is that we provide a novel model-driven methodology to design behavioral REST web service interfaces and their compositions. The behavioral interfaces provide information on what methods can be invoked on a service and the pre- and post-conditions of these methods. The methodology uses Unified Modeling Language (UML), as the modeling language, which has a wide user base and has mature tools that are continuously evolving. We have used UML class diagram and UML state machine diagram with additional design constraints to provide resource and behavioral models, respectively, for designing REST web service interfaces. These service design models serve as a specification document and the information presented in them have manifold applications. The service design models also contain information about the time and domain requirements of the service that can help in requirement traceability which is an important part of our approach. Requirement traceability helps in capturing faults in the design models and other elements of software development environment by tracing back and forth the unfulfilled requirements of the service. The information about service actors is also included in the design models which is required for authenticating the service requests by authorized actors since not all types of users have access to all the resources. In addition, following our design approach, the service developer can ensure that the designed web service interfaces will be REST compliant. The second contribution of this thesis is consistency analysis of the behavioral REST interfaces. To overcome the inconsistency problem and design errors in our service models, we have used semantic technologies. The REST interfaces are represented in web ontology language, OWL2, that can be part of the semantic web. These interfaces are used with OWL 2 reasoners to check unsatisfiable concepts which result in implementations that fail. This work is fully automated thanks to the implemented translation tool and the existing OWL 2 reasoners. The third contribution of this thesis is the verification and validation of REST web services. We have used model checking techniques with UPPAAL model checker for this purpose. The timed automata of UML based service design models are generated with our transformation tool that are verified for their basic characteristics like deadlock freedom, liveness, reachability and safety. The implementation of a web service is tested using a black-box testing approach. Test cases are generated from the UPPAAL timed automata and using the online testing tool, UPPAAL TRON, the service implementation is validated at runtime against its specifications. Requirement traceability is also addressed in our validation approach with which we can see what service goals are met and trace back the unfulfilled service goals to detect the faults in the design models. A final contribution of the thesis is an implementation of behavioral REST interfaces and service monitors from the service design models. The partial code generation tool creates code skeletons of REST web services with method pre and post-conditions. The preconditions of methods constrain the user to invoke the stateful REST service under the right conditions and the post condition constraint the service developer to implement the right functionality. The details of the methods can be manually inserted by the developer as required. We do not target complete automation because we focus only on the interface aspects of the web service. The applicability of the approach is demonstrated with a pedagogical example of a hotel room booking service and a relatively complex worked example of holiday booking service taken from the industrial context. The former example presents a simple explanation of the approach and the later worked example shows how stateful and timed web services offering complex scenarios and involving other web services can be constructed using our approach.
Resumo:
BCM (business continuity Management) is a holistic management process aiming at ensuring business continuity and building organizational resilience. Maturity models offer organizations a tool for evaluating their current maturity in a certain process. In the recent years BCM has been subject to international ISO standardization, while the interest of organizations to bechmark their state of BCM agains standards and the use of maturity models for these asessments has increased. However, although new standards have been introduced, very little attention has been paid to reviewing the existing BCM maturity models in research - especially in the light of the new ISO 22301 standard for BCM. In this thesis the existing BCM maturily models are carefully evaluated to determine whetherthey could be improved. In order to accomplish this, the compliance of the existing models to the ISO 22301 standard is measured and a framework for assessing a maturitymodel´s quality is defined. After carefully evaluating the existing frameworks for maturity model development and evaluation, an approach suggested by Becker et al. (2009) was chosen as the basis for the research. An additionto the procedural model a set of seven research guidelines proposed by the same authors was applied, drawing on the design-science research guidelines as suggested by Hevner et al. (2004). Furthermore, the existing models´ form and function was evaluated to address their usability. Based on the evaluation of the existing BCM maturity models, the existing models were found to have shortcomings in each dimension of the evaluation. Utilizing the best of the existing models, a draft version for an enhanced model was developed. This draft model was then iteratively developed by conducting six semi-structured interviews with BCM professionals in finland with the aim of validating and improving it. As a Result, a final version of the enhanced BCM maturity model was developed, conforming to the seven key clauses in the ISO 22301 standard and the maturity model development guidelines suggested by Becker et al. (2009).
Resumo:
The total number of CD34+ cells is the most relevant clinical parameter when selecting human umbilical cord blood (HUCB) for transplantation. The objective of the present study was to compare the two most commonly used CD34+ cell quantification methods (ISHAGE protocol and ProCount™ - BD) and analyze the CD34+ bright cells whose 7-amino actinomycin D (7AAD) analysis suggests are apoptotic or dead cells. Twenty-six HUCB samples obtained at the Placental Blood Program of New York Blood Center were evaluated. The absolute numbers of CD34+ cells evaluated by the ISHAGE (with exclusion of 7AAD+ cells) and ProCount™ (with exclusion of CD34+ bright cells) were determined. Using the ISHAGE protocol we found 35.6 ± 19.4 CD34+ cells/µL and with the ProCount™ method we found 36.6 ± 23.2 CD34+ cells/µL. With the ProCount™ method, CD34+ bright cell counts were 9.3 ± 8.2 cells/µL. CD34+ bright and regular cells were individually analyzed by the ISHAGE protocol. Only about 1.8% of the bright CD34+ cells are alive, whereas a small part (19.0%) is undergoing apoptosis and most of them (79.2%) are dead cells. Our study showed that the two methods produced similar results and that 7AAD is important to exclude CD34 bright cells. These results will be of value to assist in the correct counting of CD34+ cells and to choose the best HUCB unit for transplantation, i.e., the unit with the greatest number of potentially viable stem cells for the reconstitution of bone marrow. This increases the likelihood of success of the transplant and, therefore, the survival of the patient.
Resumo:
Several studies of the quantitative relationship between sodium need and sodium intake in rats are reviewed. Using acute diuretic treatment 24 h beforehand, intake matches need fairly accurately when intake is spread out in time by using a hypotonic solution of NaCl. In contrast, using a hypertonic solution, intake is typically double the need. Using the same diuretic treatment, although the natriuresis occurs within ~1 h, the appetite appears only slowly over 24 h. Increased plasma levels of aldosterone parallel the increased intake; however, treatment with metyrapone blocks the rise in aldosterone but has no effect on appetite. Satiation of sodium appetite was studied in rats using sodium loss induced by chronic diuretic treatment and daily salt consumption sessions. When a simulated foraging cost was imposed on NaCl access in the form of a progressive ratio lever press task, rats showed satiation for NaCl (break point) after consuming an amount close to their estimated deficit. The chronic diuretic regimen produced hypovolemia and large increases in plasma aldosterone concentration and renin activity. These parameters were reversed to or toward non-depleted control values at the time of behavioral satiation in the progressive ratio protocol. Satiation mechanisms for sodium appetite thus do appear to exist. However, they do not operate quantitatively when concentrated salt is available at no effort, but instead allow overconsumption. There are reasons to believe that such a bias toward overconsumption may have been beneficial over evolutionary time, but such biasing for salt and other commodities is maladaptive in a resource-rich environment.
Resumo:
There is evidence that brain temperature (Tbrain) provides a more sensitive index than other core body temperatures in determining physical performance. However, no study has addressed whether the association between performance and increases in Tbrain in a temperate environment is dependent upon exercise intensity, and this was the primary aim of the present study. Adult male Wistar rats were subjected to constant exercise at three different speeds (18, 21, and 24 m/min) until the onset of volitional fatigue. Tbrain was continuously measured by a thermistor inserted through a brain guide cannula. Exercise induced a speed-dependent increase in Tbrain, with the fastest speed associated with a higher rate of Tbrain increase. Rats subjected to constant exercise had similar Tbrain values at the time of fatigue, although a pronounced individual variability was observed (38.7-41.7°C). There were negative correlations between the rate of Tbrain increase and performance for all speeds that were studied. These results indicate that performance during constant exercise is negatively associated with the increase in Tbrain, particularly with its rate of increase. We then investigated how an incremental-speed protocol affected the association between the increase in Tbrain and performance. At volitional fatigue, Tbrain was lower during incremental exercise compared with the Tbrain resulting from constant exercise (39.3±0.3 vs 40.3±0.1°C; P<0.05), and no association between the rate of Tbrain increase and performance was observed. These findings suggest that the influence of Tbrain on performance under temperate conditions is dependent on exercise protocol.
Resumo:
In Mobile Ad-hoc Networks (MANET) the participating nodes have several roles such as sender, receiver and router. Hence there is a lot of energy consumed by the nodes for the normal working of the network since each node has many different roles. Also in MANET the nodes keep moving constantly and this in turn consumes a lot of energy. Since battery capacity of these nodes is limited it fails to fulfil the high demand of energy. The scarcity of energy makes the energy conservation in mobile ad-hoc networks an important concern. There is several research carried out on the energy consumption of mobile ad-hoc networks these days. Some of this research suggests sleep mode, transmission power control, load balancing etc. In this thesis, we are comparing various proposed energy efficient models for some of the ad-hoc protocols. We compare different energy efficient models for Optimised Linked State Algorithm (OLSR) and Ad-hoc On Demand Distance Vector (AODV). The routing protocols are compared for different parameters such as average remaining energy, number of nodes alive, payload data received and performance with different mobility speed. The simulation results helps in benchmarking the various energy efficient routing models for OLSR and AODV protocols. The benchmarking of the routing protocols can be based on many factors but this thesis concentrates on benchmarking the MANET routing protocols mainly based on the energy efficiency and increased network lifetime.
Resumo:
In this quasi-experimental study, the theory of reasoned action was used as a conceptual framework to assess the outcome effect of a predialysis class. A pretest, posttest design was used to determine changes in client knowledge about their condition and its treatment, and their intention, attitudes and social norm towards compliant behaviours. The related compliant behaviours were following a low-salt diet and taking medications as proscribed. Thirty-eight End Stage Renal Diseases (ESRD) clients were self-selected into the treatment or control groups. Both groups received the standard predialysis education from members of the multidisciplinary renal team. In addition, the treatment group also attended the predialysis class. Subjects' health locus of control, anxiety and demographic variables were measured as possible extraneous variables. Study subjects from both groups demonstrated a high internal and powerful others health locus of control and a normal range of anxiety. Although not statistically significant ill = .64), the experimental group demonstrated higher knowledge level and greater intention to follow a low salt diet UL= .73). They developed more significantly positive attitudes towards following a low salt diet and increased subjective norm influence after attending the predialysis class. Attending the predialysis class did not have an effect on subjects' intentions, attitudes or subjective norm towards taking medications as prescribed. Conclusion: The predialysis class was only marginally effective in increasing client knowledge, but influenced clients' attitudes towards following a low-salt diet. Based on the results, recommendations for improvements to the class have been suggested.
Resumo:
Quand le E-learning a émergé il ya 20 ans, cela consistait simplement en un texte affiché sur un écran d'ordinateur, comme un livre. Avec les changements et les progrès dans la technologie, le E-learning a parcouru un long chemin, maintenant offrant un matériel éducatif personnalisé, interactif et riche en contenu. Aujourd'hui, le E-learning se transforme de nouveau. En effet, avec la prolifération des systèmes d'apprentissage électronique et des outils d'édition de contenu éducatif, ainsi que les normes établies, c’est devenu plus facile de partager et de réutiliser le contenu d'apprentissage. En outre, avec le passage à des méthodes d'enseignement centrées sur l'apprenant, en plus de l'effet des techniques et technologies Web2.0, les apprenants ne sont plus seulement les récipiendaires du contenu d'apprentissage, mais peuvent jouer un rôle plus actif dans l'enrichissement de ce contenu. Par ailleurs, avec la quantité d'informations que les systèmes E-learning peuvent accumuler sur les apprenants, et l'impact que cela peut avoir sur leur vie privée, des préoccupations sont soulevées afin de protéger la vie privée des apprenants. Au meilleur de nos connaissances, il n'existe pas de solutions existantes qui prennent en charge les différents problèmes soulevés par ces changements. Dans ce travail, nous abordons ces questions en présentant Cadmus, SHAREK, et le E-learning préservant la vie privée. Plus précisément, Cadmus est une plateforme web, conforme au standard IMS QTI, offrant un cadre et des outils adéquats pour permettre à des tuteurs de créer et partager des questions de tests et des examens. Plus précisément, Cadmus fournit des modules telles que EQRS (Exam Question Recommender System) pour aider les tuteurs à localiser des questions appropriées pour leur examens, ICE (Identification of Conflits in Exams) pour aider à résoudre les conflits entre les questions contenu dans un même examen, et le Topic Tree, conçu pour aider les tuteurs à mieux organiser leurs questions d'examen et à assurer facilement la couverture des différent sujets contenus dans les examens. D'autre part, SHAREK (Sharing REsources and Knowledge) fournit un cadre pour pouvoir profiter du meilleur des deux mondes : la solidité des systèmes E-learning et la flexibilité de PLE (Personal Learning Environment) tout en permettant aux apprenants d'enrichir le contenu d'apprentissage, et les aider à localiser nouvelles ressources d'apprentissage. Plus précisément, SHAREK combine un système recommandation multicritères, ainsi que des techniques et des technologies Web2.0, tels que le RSS et le web social, pour promouvoir de nouvelles ressources d'apprentissage et aider les apprenants à localiser du contenu adapté. Finalement, afin de répondre aux divers besoins de la vie privée dans le E-learning, nous proposons un cadre avec quatre niveaux de vie privée, ainsi que quatre niveaux de traçabilité. De plus, nous présentons ACES (Anonymous Credentials for E-learning Systems), un ensemble de protocoles, basés sur des techniques cryptographiques bien établies, afin d'aider les apprenants à atteindre leur niveau de vie privée désiré.
Resumo:
Mémoire numérisé par la Division de la gestion de documents et des archives de l'Université de Montréal
Resumo:
Sensor networks are one of the fastest growing areas in broad of a packet is in transit at any one time. In GBR, each node in the network can look at itsneighbors wireless ad hoc networking (? Eld. A sensor node, typically'hop count (depth) and use this to decide which node to forward contains signal-processing circuits, micro-controllers and a the packet on to. If the nodes' power level drops below a wireless transmitter/receiver antenna. Energy saving is one certain level it will increase the depth to discourage trafiE of the critical issue for sensor networks since most sensors are equipped with non-rechargeable batteries that have limitedlifetime. Routing schemes are used to transfer data collectedby sensor nodes to base stations. In the literature many routing protocols for wireless sensor networks are suggested. In this work, four routing protocols for wireless sensor networks viz Flooding, Gossiping, GBR and LEACH have been simulated using TinyOS and their power consumption is studied using PowerTOSSIM. A realization of these protocols has beencarried out using Mica2 Motes.
Resumo:
Sensor networks are one of the fastest growing areas in broad of a packet is in transit at any one time. In GBR, each node in the network can look at itsneighbors wireless ad hoc networking (? Eld. A sensor node, typically'hop count (depth) and use this to decide which node to forward contains signal-processing circuits, micro-controllers and a the packet on to. If the nodes' power level drops below a wireless transmitter/receiver antenna. Energy saving is one certain level it will increase the depth to discourage trafiE of the critical issue forfor sensor networks since most sensors are equipped with non-rechargeable batteries that have limited lifetime.
Resumo:
Wireless sensor networks monitor their surrounding environment for the occurrence of some anticipated phenomenon. Most of the research related to sensor networks considers the static deployment of sensor nodes. Mobility of sensor node can be considered as an extra dimension of complexity, which poses interesting and challenging problems. Node mobility is a very important aspect in the design of effective routing algorithm for mobile wireless networks. In this work we intent to present the impact of different mobility models on the performance of the wireless sensor networks. Routing characteristics of various routing protocols for ad-hoc network were studied considering different mobility models. Performance metrics such as end-to-end delay, throughput and routing load were considered and their variations in the case of mobility models like Freeway, RPGM were studied. This work will be useful to figure out the characteristics of routing protocols depending on the mobility patterns of sensors